Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Top 10 Use Cases of Vibe Coding in Large-Scale Node.js Applications

      September 3, 2025

      Cloudsmith launches ML Model Registry to provide a single source of truth for AI models and datasets

      September 3, 2025

      Kong Acquires OpenMeter to Unlock AI and API Monetization for the Agentic Era

      September 3, 2025

      Microsoft Graph CLI to be retired

      September 2, 2025

      ‘Cronos: The New Dawn’ was by far my favorite experience at Gamescom 2025 — Bloober might have cooked an Xbox / PC horror masterpiece

      September 4, 2025

      ASUS built a desktop gaming PC around a mobile CPU — it’s an interesting, if flawed, idea

      September 4, 2025

      Hollow Knight: Silksong arrives on Xbox Game Pass this week — and Xbox’s September 1–7 lineup also packs in the horror. Here’s every new game.

      September 4, 2025

      The Xbox remaster that brought Gears to PlayStation just passed a huge milestone — “ending the console war” and proving the series still has serious pulling power

      September 4, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Magento (Adobe Commerce) or Optimizely Configured Commerce: Which One to Choose

      September 4, 2025
      Recent

      Magento (Adobe Commerce) or Optimizely Configured Commerce: Which One to Choose

      September 4, 2025

      Updates from N|Solid Runtime: The Best Open-Source Node.js RT Just Got Better

      September 3, 2025

      Scale Your Business with AI-Powered Solutions Built for Singapore’s Digital Economy

      September 3, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      ‘Cronos: The New Dawn’ was by far my favorite experience at Gamescom 2025 — Bloober might have cooked an Xbox / PC horror masterpiece

      September 4, 2025
      Recent

      ‘Cronos: The New Dawn’ was by far my favorite experience at Gamescom 2025 — Bloober might have cooked an Xbox / PC horror masterpiece

      September 4, 2025

      ASUS built a desktop gaming PC around a mobile CPU — it’s an interesting, if flawed, idea

      September 4, 2025

      Hollow Knight: Silksong arrives on Xbox Game Pass this week — and Xbox’s September 1–7 lineup also packs in the horror. Here’s every new game.

      September 4, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Learning Resources»Basic Networking Part 1– How Do Computer Systems Communicate?

    Basic Networking Part 1– How Do Computer Systems Communicate?

    June 2, 2025

    Read the All Part of Our Basic Networking Series

    1. Basic Networking Part 1
    2. Basic Networking Part 2
    3. Basic Networking Part 3
    4. Basic Networking Part 4
    5. Basic Networking Part 5
    6. Basic Networking Part 6

    How Do Computers Communicate?

    Introduction

    Human communication and computer communication are very similar. Many parts of computer science are, in fact, comparable to human behavior. If you’re interested in learning how these machines communicate with one another and how data flows through a network, this article is for you. If computers appear to be a fascinating subject for your thinking, computer communication may pique your interest.

    How Do Computer Systems Communicate

    Before we go into computer communications, let’s have a look at the article’s structure. The first few paragraphs give an overview of computer systems. Following that, we’ll go over more technical topics like computer networking and network protocols.

    Computers Connect with One Another using Their Own Network

    On a daily basis, we use the internet. This essentially indicates that we’re all part of the same network. The Internet is a global network that connects all of the world’s users, allowing them to communicate with one another at any time and from any location because they are all members of the same network. A network is a collection of interconnected devices. It can also be a collection of smaller networks. A computer network is made up of two or more computers connected through a network media. Users on the same network can share the same hardware (a printer) and software (apps) and send various types of data such as text, video, and audio. Hardware is employed to connect them, such as the

    There are two different sorts of networks. Local area networks and wide area networks are the two types. The key distinction is the network’s range of connectivity. Let’s start with a basic definition of what a local network is.
    Because it is established locally, the LAN (Local Area Network) may connect a smaller number of computers, as its name suggests.

    You could conceive of a local network as a system that connects people who share a common interest, such as computers in a classroom to allow students and staff to communicate, or computers in a business. The LAN can be a secure network that only they can access and use. As a result, the LAN now has authorized users who use their IP addresses as indicated below.

    The network’s identification of the sender and recipient is also detailed below.
    Let’s have a look at the wide area network now. The Wide Area Network (WAN) can be used to construct a larger network than the LAN as the number of users grows. The WAN is a network that links networks over wide geographical areas. Assume that the company has expanded its offices to other countries or locations and that they still wish to connect with one another. The Wide Area Network (WAN) is used to carry data over great distances or between networks that are connected to a larger one. Because of the number of users and complexity, WAN speeds can be slower than LAN speeds, however this is dependent on the settings.

    What method does the network use to determine which computer is the intended recipient?

    We’ve already established a LAN. We can join all of the machines in the same network with a single Ethernet connection. When computer A (or a user) wants to send a message to computer B, the message travels over the cable and is received by all computers in the network because they all share the same medium.

    But how does the network know who the message is intended for?

    The message is destined for a reader who is eager to read it and is likely to wish to exchange information in return. The router utilizes the MAC address of each machine to resolve this issue. This address ensures that the physical address of the machine is unique.

    The Internet Protocol facilitates data transmission within a network. Network packets are used to send the data. A static IP address and a public IP address are assigned to each computer.

    Your machine has its own private IP address. Your gadget is given an address by your ISP (Internet Service Provider). The router saves this IP address. A routing table is stored on the router and contains all of the private IP addresses (mobile, laptop, etc.) that are connected to this network.

    Summary

    The principles of computer communications are covered in this article. You now understand how data is transferred from a wire as a signal to another computer in readable form, going through several levels and protocols. When you press the Send button, the data (signal) becomes 01010101, which passes through the OSI model’s multiple layers.

    Love our articles? Make sure to follow us on Twitter and GitHub, we post article updates there. To join our KaliLinuxInfamily, join our Telegram Group and Whatsapp Channel. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBasic Networking Part 2 — What Is Data Packets?
    Next Article Betting apps in Bangladesh review

    Related Posts

    News & Updates

    ‘Cronos: The New Dawn’ was by far my favorite experience at Gamescom 2025 — Bloober might have cooked an Xbox / PC horror masterpiece

    September 4, 2025
    News & Updates

    ASUS built a desktop gaming PC around a mobile CPU — it’s an interesting, if flawed, idea

    September 4, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    4 Ways I am Encouraging My 4 Year Old Child to Help Learn Coding and Use Computer

    Learning Resources

    How to Detect Phishing Attacks Faster: Tycoon2FA Example

    Development

    CVE-2025-38340 – “Linux Firmware cs_dsp Out-of-Bounds Memory Read Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    Valve just announced every Steam sale date from now until Summer 2026 — here’s exactly when you can save big bucks on the best PC games

    News & Updates

    Highlights

    AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks, Veracode Research Reveals   

    July 31, 2025

    While AI is becoming better at generating that functional code, it is also enabling attackers…

    RefreshOS is a distribution built on the robust foundation of Debian

    May 24, 2025

    A Coding Guide to Build Intelligent Multi-Agent Systems with the PEER Pattern

    August 2, 2025

    Why chase a Nintendo Switch 2 when the Lenovo Legion Go is $200 off, in stock, and runs Windows 11 or SteamOS?

    June 5, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.